CVE-2026-40116

PraisonAI is a multi-agent teams system. Prior to 4.5.128, the /media-stream WebSocket endpoint in PraisonAI's call module accepts connections from any client without authentication or Twilio signature validation. Each connection opens an authenticated session to OpenAI's Realtime API using the server's API key. There are no limits on concurrent connections, message rate, or message size, allowing an unauthenticated attacker to exhaust server resources and drain the victim's OpenAI API credits. This vulnerability is fixed in 4.5.128.
Configurations

Configuration 1 (hide)

cpe:2.3:a:praison:praisonai:*:*:*:*:*:*:*:*

History

17 Apr 2026, 18:33

Type Values Removed Values Added
CPE cpe:2.3:a:praison:praisonai:*:*:*:*:*:*:*:*
First Time Praison
Praison praisonai
References () https://github.com/MervinPraison/PraisonAI/security/advisories/GHSA-q5r4-47m9-5mc7 - () https://github.com/MervinPraison/PraisonAI/security/advisories/GHSA-q5r4-47m9-5mc7 - Exploit, Vendor Advisory

14 Apr 2026, 15:16

Type Values Removed Values Added
References () https://github.com/MervinPraison/PraisonAI/security/advisories/GHSA-q5r4-47m9-5mc7 - () https://github.com/MervinPraison/PraisonAI/security/advisories/GHSA-q5r4-47m9-5mc7 -

09 Apr 2026, 22:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-09 22:16

Updated : 2026-04-17 18:33


NVD link : CVE-2026-40116

Mitre link : CVE-2026-40116

CVE.ORG link : CVE-2026-40116


JSON object : View

Products Affected

praison

  • praisonai
CWE
CWE-770

Allocation of Resources Without Limits or Throttling